diff options
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 70 |
1 files changed, 56 insertions, 14 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 9b00e09d..4e6db02f 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,52 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Wed, 28 Nov 2018 07:25:32 GMT</pubDate> - <lastBuildDate>Wed, 28 Nov 2018 16:59:41 GMT</lastBuildDate> + <pubDate>Thu, 29 Nov 2018 05:53:27 GMT</pubDate> + <lastBuildDate>Thu, 29 Nov 2018 16:59:42 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.10</generator> <item> + <title>Thu, 29 Nov 2018 05:53:27 GMT</title> + <pubDate>Thu, 29 Nov 2018 05:53:27 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20181129055327</link> + <guid isPermaLink="false">20181129055327</guid> + <description> + <![CDATA[<pre> +a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt. + rc.S: simplify test for F2FS filesystem on /. Thanks to GazL. +ap/soma-3.2.0-noarch-1.txz: Upgraded. +d/cmake-3.13.1-x86_64-1.txz: Upgraded. +l/jansson-2.12-x86_64-1.txz: Upgraded. +n/rp-pppoe-3.13-x86_64-1.txz: Upgraded. +n/samba-4.9.3-x86_64-1.txz: Upgraded. + This update fixes bugs and security issues: + CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD + Internal DNS server + CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT + CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server + CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers + CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos + configuration (unsupported) + CVE-2018-16857: Bad password count in AD DC not always effective + For more information, see: + https://www.samba.org/samba/security/CVE-2018-14629.html + https://www.samba.org/samba/security/CVE-2018-16841.html + https://www.samba.org/samba/security/CVE-2018-16851.html + https://www.samba.org/samba/security/CVE-2018-16852.html + https://www.samba.org/samba/security/CVE-2018-16853.html + https://www.samba.org/samba/security/CVE-2018-16857.html + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857 + (* Security fix *) +x/mesa-18.2.6-x86_64-1.txz: Upgraded. +x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded. + </pre>]]> + </description> + </item> + <item> <title>Wed, 28 Nov 2018 07:25:32 GMT</title> <pubDate>Wed, 28 Nov 2018 07:25:32 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20181128072532</link> @@ -164,18 +206,18 @@ ap/mariadb-10.3.11-x86_64-1.txz: Upgraded. This update fixes bugs and security issues. For more information, see: https://mariadb.com/kb/en/library/mariadb-10311-release-notes/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3282 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-9843 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3174 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3143 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3156 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3251 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3185 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3277 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3162 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3173 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3200 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3284 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3185 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3277 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3162 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3173 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3200 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3284 (* Security fix *) d/cmake-3.13.0-x86_64-1.txz: Upgraded. d/git-2.19.2-x86_64-1.txz: Upgraded. |